Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2011-1154

Published: 30 March 2011

The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.

Notes

AuthorNote
mdeslaur
issue #6
shred option was introduced in logrotate 3.7.5

Priority

Medium

Status

Package Release Status
logrotate
Launchpad, Ubuntu, Debian
dapper Not vulnerable
(code not present)
hardy Not vulnerable
(code not present)
karmic Ignored
(end of life)
lucid
Released (3.7.8-4ubuntu2.2)
maverick
Released (3.7.8-6ubuntu1.1)
natty
Released (3.7.8-6ubuntu3.1)
upstream Needs triage

Patches:
upstream: https://fedorahosted.org/logrotate/changeset/311
upstream: https://fedorahosted.org/logrotate/changeset/313